<< Prev Question Next Question >>

Question 82/149

Your guest-access wireless network is experiencing degraded performance and excessive latency due to user saturation. Which type of rate limiting can you implement on your network to correct the problem?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (149q)
Question 1: Which two statements about administrative access to the ACS ...
Question 2: Refer to the exhibit. (Exhibit) Which URL must you enter in ...
Question 3: Which feature of Cisco ASA allows VPN users to be postured a...
Question 4: Which administrative role has permission to assign Security ...
Question 5: A network administrator needs to determine the ability of ex...
Question 6: After an endpoint has completed authentication with MAB, a s...
Question 7: Wireless client supplicants attempting to authenticate to a ...
Question 8: In this simulation, you are task to examine the various auth...
Question 9: Which mechanism does Cisco ISE use to force a device off the...
Question 10: How frequently does the Profiled Endpoints dashlet refresh d...
Question 11: Which three statements about the Cisco wireless IPS solution...
Question 12: In Cisco ISE, which probe must be enabled to collect profili...
Question 13: What are the initial steps to configure an ACS as a TACACS s...
Question 14: Which two switchport commands enable MAB and allow non-802.1...
Question 15: Which two components are required to connect to a WLAN netwo...
Question 16: Which action must an administrator take after joining a Cisc...
Question 17: In the command 'aaa authentication default group tacacs loca...
Question 18: Which statement about system time and NTP server configurati...
Question 19: Which EAP method uses a modified version of the MS-CHAP auth...
Question 20: What is a requirement for posture administration services in...
Question 21: In a split ACS deployment with primary and secondary servers...
Question 22: What user rights does an account need to join ISE to a Micro...
Question 23: A user is on a wired connection and the posture status is no...
Question 24: Which protocol sends authentication and accounting in differ...
Question 25: What is another term for 802.11i wireless network security?...
Question 26: Certain endpoints are missing DHCP profiling data. Which opt...
Question 27: What steps must you perform to deploy a CA-signed identify c...
Question 28: A network administrator must enable which protocol extension...
Question 29: Which two services are included in the Cisco ISE posture ser...
Question 30: Changes were made to the ISE server while troubleshooting, a...
Question 31: Which setting provides the best security for a WLAN and auth...
Question 32: You are configuring SGA on a network device that is unable t...
Question 33: Which three host modes support MACsec? (Choose three.)...
Question 34: Which two Cisco ISE administration options are available in ...
Question 35: Which two identity store options allow you to authorize base...
Question 36: You enabled the guest session limit feature on the Cisco ISE...
Question 37: Which command is useful when troubleshooting AAA Authenticat...
Question 38: Which configuration must you perform on a switch to deploy C...
Question 39: In this simulation, you are task to examine the various auth...
Question 40: Which two profile attributes can be collected by a Cisco Cat...
Question 41: Which effect does the ip http secure-server command have on ...
Question 42: What is the purpose of the Cisco ISE Guest Service Sponsor P...
Question 43: What steps must you perform to deploy a CA-signed identity c...
Question 44: When you configure an endpoint profiling policy rule, which ...
Question 45: Which two profile attributes can be collected by a Cisco Wir...
Question 46: Refer to the exhibit. (Exhibit) Which three statements about...
Question 47: In an 802.1X authorization process, a network access device ...
Question 48: When RADIUS NAC and AAA Override are enabled for WLC on a Ci...
Question 49: What is the default posture status for non-agent capable dev...
Question 50: CORRECT TEXT The Secure-X company has started to tested the ...
Question 51: In this simulation, you are task to examine the various auth...
Question 52: A network engineer is configuring HTTP based CWA on a switch...
Question 53: Which three statements about the Cisco ISE profiler are true...
Question 54: In the command 'aaa authentication default group tacacs loca...
Question 55: A network administrator must enable which protocol to utiliz...
Question 56: In Cisco ISE, which two actions can be taken based on matchi...
Question 57: Which error in a redirect ACL can cause the redirection of a...
Question 58: DRAG DROP (Exhibit)
Question 59: In this simulation, you are task to examine the various auth...
Question 60: What are two possible reasons why a scheduled nightly backup...
Question 61: Which authorization method is the Cisco best practice to all...
Question 62: Which Cisco ISE 1.x protocol can be used to control admin ac...
Question 63: What is the function of the SGACL policy matrix on a Cisco T...
Question 64: Which command can check a AAA server authentication for serv...
Question 65: Which time allowance is the minimum that can be configured f...
Question 66: What implementation must be added to the WLC to enable 802.1...
Question 67: Cisco ISE distributed deployments support which three featur...
Question 68: Which five portals are provided by PSN? (Choose five.)...
Question 69: Where is client traffic decrypted in a controller-based wire...
Question 70: Which option restricts guests from connecting more than one ...
Question 71: Which two portals can be configured to use portal FQDN? (Cho...
Question 72: Refer to the exhibit. (Exhibit) You are troubleshooting RADI...
Question 73: Which statement about Cisco ISE BYOD is true?...
Question 74: Which command in the My Devices Portal can restore a previou...
Question 75: What attribute could be obtained from the SNMP query probe?...
Question 76: Which type of remediation does Windows Server Update Service...
Question 77: When MAB is configured, how often are ports reauthenticated ...
Question 78: What are the initial steps to configure an ACS as a TACACS s...
Question 79: Which type of access list is the most scalable that Cisco IS...
Question 80: Which three are required steps to enable SXP on a Cisco ASA?...
Question 81: In the command 'aaa authentication default group tacacs loca...
Question 82: Your guest-access wireless network is experiencing degraded ...
Question 83: An organization has recently deployed ISE with Trustsec capa...
Question 84: When you add a new PSN for guest access services, which two ...
Question 85: Which RADIUS attribute is used primarily to differentiate an...
Question 86: Which functionality does the Cisco ISE self-provisioning flo...
Question 87: Which two options are EAP methods supported by Cisco ISE? (C...
Question 88: An organization has recently deployed ISE with the latest mo...
Question 89: Which three algorithms should be avoided due to security con...
Question 90: What are the initial steps must you perform to add the ISE t...
Question 91: Where would a Cisco ISE administrator define a named ACL to ...
Question 92: Which two fields are characteristics of IEEE 802.1AE frame? ...
Question 93: Where must periodic re-authentication be configured to allow...
Question 94: Which two identity databases are supported when PEAP-MSCHAPv...
Question 95: What is a required step when you deploy dynamic VLAN and ACL...
Question 96: Which identity store option allows you to modify the directo...
Question 97: Which statement about the Cisco ISE BYOD feature is true?...
Question 98: What is a required configuration step for an 802.1X capable ...
Question 99: In a multi-node ISE deployment, backups are not working on t...
Question 100: Which three components comprise the Cisco ISE profiler? (Cho...
Question 101: Which two Active Directory authentication methods are suppor...
1 commentQuestion 102: The NAC Agent uses which port and protocol to send discovery...
Question 103: What endpoint operating system provides native support for t...
Question 104: When RADIUS NAC and AAA Override are enabled for a WLC on a ...
Question 105: The corporate security policy requires multiple elements to ...
Question 106: Which two attributes must match between two Cisco ASA device...
Question 107: With which two appliance-based products can Cisco Prime Infr...
Question 108: Cisco 802.1X phasing enables flexible deployments through th...
Question 109: Where is dynamic SGT classification configured?...
Question 110: You are installing Cisco ISE on nodes that will be used in a...
Question 111: You configured wired 802.1X with EAP-TLS on Windows machines...
Question 112: You have configured a Cisco ISE 1.2 deployment for self-regi...
Question 113: In AAA, what function does authentication perform?...
Question 114: Which two statements about MAB are true? (Choose two.)...
Question 115: Which two Cisco Catalyst switch interface commands allow onl...
Question 116: Which command configures console port authorization under li...
Question 117: Which feature must you configure on a switch to allow it to ...
Question 118: A properly configured Cisco ISE Policy Service node is not r...
Question 119: Which network access device feature can you configure to gat...
Question 120: Which statement about a distributed Cisco ISE deployment is ...
Question 121: During client provisioning on a Mac OS X system, the client ...
Question 122: You discover that the Cisco ISE is failing to connect to the...
Question 123: Which condition triggers wireless authentication?...
Question 124: From which location can you run reports on endpoint profilin...
Question 125: Security Group Access requires which three syslog messages t...
Question 126: Which network component would issue the CoA?...
Question 127: What three changes require restarting the application servic...
Question 128: What is the effect of the ip http secure-server command on a...
Question 129: Which advanced authentication setting is needed to allow an ...
Question 130: What is the first step that occurs when provisioning a wired...
Question 131: Which two statements about administrative access to the Cisc...
Question 132: Refer to the exhibit. (Exhibit) The links outside the TrustS...
Question 133: Which set of commands allows IPX inbound on all interfaces?...
Question 134: Which two authentication stores are supported to design a wi...
Question 135: The NAC Agent v4.9.x uses which ports and protocols to commu...
Question 136: Which two types of client provisioning resources are used fo...
Question 137: Which three posture states can be used for authorization rul...
Question 138: Which three remediation actions are supported by the Web Age...
Question 139: Refer to the exhibit. (Exhibit) You are configuring permissi...
Question 140: You are troubleshooting wired 802.1X authentications and see...
Question 141: Which term describes a software application that seeks conne...
Question 142: Which two conditions are valid when configuring ISE for post...
Question 143: Which three personas can a Cisco ISE assume in a deployment?...
Question 144: Which three statements describe differences between TACACS+ ...
Question 145: What type of identity group is the Blacklist identity group?...
Question 146: Which statement about Cisco Management Frame Protection is t...
Question 147: Which feature enables the Cisco ISE DHCP profiling capabilit...
Question 148: Which profiling capability allows you to gather and forward ...
Question 149: Which two EAP types require server side certificates? (Choos...